Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
26/05/2024, 22:12
Static task
static1
Behavioral task
behavioral1
Sample
5dcb456a45e9e9a9d4503269849f10b76fbfd26756c55d6983eae801f38eefbb.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
5dcb456a45e9e9a9d4503269849f10b76fbfd26756c55d6983eae801f38eefbb.exe
Resource
win10v2004-20240508-en
General
-
Target
5dcb456a45e9e9a9d4503269849f10b76fbfd26756c55d6983eae801f38eefbb.exe
-
Size
29KB
-
MD5
3d3c5b02f8c6d22cdc52c74b810011a8
-
SHA1
3e1f9f94f7f4fff3c772e62db75357104a3d5943
-
SHA256
5dcb456a45e9e9a9d4503269849f10b76fbfd26756c55d6983eae801f38eefbb
-
SHA512
de4a65b7349b27f8557588082e85571096f3cf63436af18fa635a37ab055f40656087156f8b674d6d6c37dd48d810297d12581a6241d1dc11a61fa9dc416e305
-
SSDEEP
768:PVEHJqjHyGvwFylDpulVSQJrE/2QmlCYZUT3v1VwOxfrfk7:PH2nylslwHCCLBPr8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2636 rundll32.exe -
Loads dropped DLL 2 IoCs
pid Process 1200 5dcb456a45e9e9a9d4503269849f10b76fbfd26756c55d6983eae801f38eefbb.exe 1200 5dcb456a45e9e9a9d4503269849f10b76fbfd26756c55d6983eae801f38eefbb.exe -
Modifies system executable filetype association 2 TTPs 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 5dcb456a45e9e9a9d4503269849f10b76fbfd26756c55d6983eae801f38eefbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 5dcb456a45e9e9a9d4503269849f10b76fbfd26756c55d6983eae801f38eefbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 5dcb456a45e9e9a9d4503269849f10b76fbfd26756c55d6983eae801f38eefbb.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\notepad¢¬.exe 5dcb456a45e9e9a9d4503269849f10b76fbfd26756c55d6983eae801f38eefbb.exe File opened for modification C:\Windows\SysWOW64\¢«.exe 5dcb456a45e9e9a9d4503269849f10b76fbfd26756c55d6983eae801f38eefbb.exe File created C:\Windows\SysWOW64\¢«.exe 5dcb456a45e9e9a9d4503269849f10b76fbfd26756c55d6983eae801f38eefbb.exe File opened for modification C:\Windows\SysWOW64\notepad¢¬.exe 5dcb456a45e9e9a9d4503269849f10b76fbfd26756c55d6983eae801f38eefbb.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\system\rundll32.exe 5dcb456a45e9e9a9d4503269849f10b76fbfd26756c55d6983eae801f38eefbb.exe File created C:\Windows\system\rundll32.exe 5dcb456a45e9e9a9d4503269849f10b76fbfd26756c55d6983eae801f38eefbb.exe -
Modifies registry class 15 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" 5dcb456a45e9e9a9d4503269849f10b76fbfd26756c55d6983eae801f38eefbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainUp = "1716761581" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv rundll32.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainSetup = "1716761581" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\exefile\shell\open\command 5dcb456a45e9e9a9d4503269849f10b76fbfd26756c55d6983eae801f38eefbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "\"%1\" %*" 5dcb456a45e9e9a9d4503269849f10b76fbfd26756c55d6983eae801f38eefbb.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command 5dcb456a45e9e9a9d4503269849f10b76fbfd26756c55d6983eae801f38eefbb.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Classes\MSipv\MainVer = "506" rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\txtfile\shell\open\command rundll32.exe Key created \REGISTRY\MACHINE\Software\Classes\MSipv 5dcb456a45e9e9a9d4503269849f10b76fbfd26756c55d6983eae801f38eefbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad.exe %1" 5dcb456a45e9e9a9d4503269849f10b76fbfd26756c55d6983eae801f38eefbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" 5dcb456a45e9e9a9d4503269849f10b76fbfd26756c55d6983eae801f38eefbb.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "¢« \"%1\" %*" rundll32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "notepad¢¬ %1" rundll32.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1200 5dcb456a45e9e9a9d4503269849f10b76fbfd26756c55d6983eae801f38eefbb.exe 1200 5dcb456a45e9e9a9d4503269849f10b76fbfd26756c55d6983eae801f38eefbb.exe 1200 5dcb456a45e9e9a9d4503269849f10b76fbfd26756c55d6983eae801f38eefbb.exe 1200 5dcb456a45e9e9a9d4503269849f10b76fbfd26756c55d6983eae801f38eefbb.exe 1200 5dcb456a45e9e9a9d4503269849f10b76fbfd26756c55d6983eae801f38eefbb.exe 1200 5dcb456a45e9e9a9d4503269849f10b76fbfd26756c55d6983eae801f38eefbb.exe 1200 5dcb456a45e9e9a9d4503269849f10b76fbfd26756c55d6983eae801f38eefbb.exe 1200 5dcb456a45e9e9a9d4503269849f10b76fbfd26756c55d6983eae801f38eefbb.exe 1200 5dcb456a45e9e9a9d4503269849f10b76fbfd26756c55d6983eae801f38eefbb.exe 1200 5dcb456a45e9e9a9d4503269849f10b76fbfd26756c55d6983eae801f38eefbb.exe 1200 5dcb456a45e9e9a9d4503269849f10b76fbfd26756c55d6983eae801f38eefbb.exe 1200 5dcb456a45e9e9a9d4503269849f10b76fbfd26756c55d6983eae801f38eefbb.exe 1200 5dcb456a45e9e9a9d4503269849f10b76fbfd26756c55d6983eae801f38eefbb.exe 1200 5dcb456a45e9e9a9d4503269849f10b76fbfd26756c55d6983eae801f38eefbb.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2636 rundll32.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1200 5dcb456a45e9e9a9d4503269849f10b76fbfd26756c55d6983eae801f38eefbb.exe 2636 rundll32.exe 2636 rundll32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1200 wrote to memory of 2636 1200 5dcb456a45e9e9a9d4503269849f10b76fbfd26756c55d6983eae801f38eefbb.exe 28 PID 1200 wrote to memory of 2636 1200 5dcb456a45e9e9a9d4503269849f10b76fbfd26756c55d6983eae801f38eefbb.exe 28 PID 1200 wrote to memory of 2636 1200 5dcb456a45e9e9a9d4503269849f10b76fbfd26756c55d6983eae801f38eefbb.exe 28 PID 1200 wrote to memory of 2636 1200 5dcb456a45e9e9a9d4503269849f10b76fbfd26756c55d6983eae801f38eefbb.exe 28 PID 1200 wrote to memory of 2636 1200 5dcb456a45e9e9a9d4503269849f10b76fbfd26756c55d6983eae801f38eefbb.exe 28 PID 1200 wrote to memory of 2636 1200 5dcb456a45e9e9a9d4503269849f10b76fbfd26756c55d6983eae801f38eefbb.exe 28 PID 1200 wrote to memory of 2636 1200 5dcb456a45e9e9a9d4503269849f10b76fbfd26756c55d6983eae801f38eefbb.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\5dcb456a45e9e9a9d4503269849f10b76fbfd26756c55d6983eae801f38eefbb.exe"C:\Users\Admin\AppData\Local\Temp\5dcb456a45e9e9a9d4503269849f10b76fbfd26756c55d6983eae801f38eefbb.exe"1⤵
- Loads dropped DLL
- Modifies system executable filetype association
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\system\rundll32.exeC:\Windows\system\rundll32.exe2⤵
- Executes dropped EXE
- Modifies system executable filetype association
- Modifies registry class
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2636
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD5e8ae21ef17b87689d37628affbfbe6d1
SHA1a6f8743dacfb2a75707f367ffade8c847d0607f4
SHA25644e045f4ab4fa8196b270f7a4eda33fce6d5fe4aaeae8e9c16689e453aaa5709
SHA5129276b974e480ac241296515193036bf3508ed600e69f654b20595a2f7747e034c2cb028ca9721e6bf233f9b11c49a291ce78ed8f420ff812ea8ff24035aee1a0
-
Filesize
27KB
MD5095324f8001b31e01c16d6a21acb361f
SHA12a6ce394e20fb5c9b62250a0ae107d6851d8cfdd
SHA2568a5a7b8f37402926133559c56eb0ffb5f98380ad0a7457697ab158c80fea985b
SHA512381f9c773b09d0ada0896e51999ccf9daaf93a0359745b4211c741fbb933def8db81e94283c4bb55ebd25fe3be196744cf896dbc0b2566b40c68e9f10500a448